Summary: Performance Anomaly Detection And Bottleneck Identification

Good Essays
JOURNAL REVIEW
Ibidunmoye, O., Hernández-Rodriguez, F., Elmroth, E. (2015). Performance anomaly detection and bottleneck identification. ACM Comput. Surv. 48, 1, Article 4 (July 2015), 35 pages.
Introduction
The article chosen is “Performance Anomaly Detection and Bottleneck Identification” in which Ibidunmoye, Hernández-Rodriguez, and Elmroth discuss how varying attempts are being made to create methods that can prevent anomalies and identify bottlenecks that create performance issues within operating systems. The article highlights how bottlenecks and anomalies often create problems within distributed systems and how prior solutions through the use of PADBI systems can be built upon to improve detection methods.
Article Summary
As presented
…show more content…
As identified within the article some of the challenges that can be faced are: Dynamic Dependency in which cascading bottlenecks within large data centers can be hard to detect [Wang et al. 2013b]. Dynamic Anomaly Characteristics in which defining a priori all possible behaviors (normal or anomalous) of an application is technically unrealistic [Lan et al. 2010]. Finally, Nature of Data makes it difficult to consume the data in a uniform manner [Lan et al. 2010]. Thus the objective of the research in the article is to understand how systems would be able to address both performance anomaly detection and bottleneck identification (PADBI). According to the authors there has been literature that presents both methods and strategies from different fields that are commonly used techniques in approaching PADBI systems. Most of the methodology proposed is based on methods that involve models of the correlation between work load changes and performance that can be used to predict performance challenges. In the early 2000s and the slow emergence of applications, techniques where being proposed as ways to improve upon detecting bottlenecks and anomalies as server infrastructures were starting to grow. By the mid-2000s analytical techniques were being applied and considered a suitable method for detecting performance abnormalities [Chung et al. 2008; Agarwala et al. 2007]. Currently, there is still research being performed and expanded because of the use of the cloud. Even though existing research contribution is dominated by reactive solutions, there is increasing shift toward proactive approach. Predictive anomaly and bottleneck detection offers better system reliability by raising in advance, just-in-time alerts and detecting potential bottlenecks before a performance issue occur [O. Ibidunmoye et

Related Documents

  • Decent Essays

    Some of the challenges as given by Ronald S Tibben-Lemke and Dale Rogers are given below: 1. Forecasting for returns is difficult due to nature of uncertainty as it initiates from customers. Rates of returns are unpredictable. 2. Transportation routes are from many points to one point as the collection been done from multiple points and flow moving towards a single or few destinations.…

    • 763 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    S = Cost of placing an order. I = Inventory carrying costs of one unit. Limitations of EOQ Model: 1. The demand for inventory is seldom constant. When demand fluctuates, the EOQ model will give misleading results.…

    • 1897 Words
    • 8 Pages
    Decent Essays
  • Decent Essays

    Radish Seed Experiment

    • 1445 Words
    • 6 Pages

    “Radishes.” Horiculture 110.4 (2013):18. Science Reference Center. Web. 2 Nov. 2015. Larkcom, J.…

    • 1445 Words
    • 6 Pages
    Decent Essays
  • Decent Essays

    Authority ambiguity and role ambiguity, having more people provide approval as well as a lack of clarity about the expectations increases cycle time of the process. Bottlenecks can limit the performance of the entire system, and sometimes, it leads to delay in the process. Similarly, cycle time which is the time required to complete the entire process should be at the priority. Data duplication and paper records are major business processes that need to be improved to reduce the data redundancy and cybercrimes. Handoffs, the transfer of responsibility from one department of business to another should be handled carefully so that it will not create any confusions or mistakes.…

    • 814 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    Rivalry In Unilever

    • 795 Words
    • 4 Pages

    (2014). Guidelines for applying Porter’s five forces framework: a set of industry analysis templates. Competitiveness Review, 24(1), 32-45. • Grundy, T. (2006). Rethinking and reinventing Michael Porter’s five forces model.…

    • 795 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    The classical MES are defined by a static hierarchy of services and data structures, which makes them very difficult to modify. The change of the production model from mass manufacturing to customised manufacturing and short-series production presents new challenges to MES [1]. The emergence of the concept of Cyber Physical Systems (CPS) enforces…

    • 1385 Words
    • 6 Pages
    Decent Essays
  • Decent Essays

    This uncertainty will affect inter-organizational relationships. With services being very unique with specific characteristics, there is a scope of an expert power being formed in the process. For smooth inter-organizational relationships, firms need to do away with the dependence on resource and power from other…

    • 3045 Words
    • 13 Pages
    Decent Essays
  • Decent Essays

    Once the company has its mission set, it has to set some CSFs custom to its project as these factors greatly influence the success or failure of the project. In this article we discuss some of the CSFs and how they impact the project and the repercussions of not following them. Critical Success Factors to Critical Success Processes Although we know the importance of the Critical Success Factors and how they influence the success of the projects, the failure rate of the projects is still pretty high. One of the reasons why this could happen is the CSFs are too generic and do not have the detailed information about how the tasks need to be executed. In this topic, we discuss the importance of having the right CSFs and what has the highest impact on the overall success and what would lead to the project short comes and how that can be avoided.…

    • 937 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    Risk Assessment

    • 1193 Words
    • 5 Pages

    In conclusion, SFRA focuses on how to act while traditional approaches focuses on what to fear. Furthermore, those who apply SFRA consider how to do more good rather than to do less harm. However, this risk assessment is at its crossroads for its authority being challenged. Because risk assessment is combined with scientific, political and public issues, it is becoming increasingly complex for any analysis is creating more data that leads to questions about how to address the issues, especially as risk-management issues that appear difficult to address with standard risk assessment methods such as global climate change, endocrine disruption, and environmental justice. What’s more, risk assessment is being applied to address broader environmental problems.…

    • 1193 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    This can be seen as opportunity due to the unforeseen potential that developing econmies may present. The barriers SME’s must overcome are that investing to internationalise in these economies require large amounts of capital in which many cases SME’s lack financial resources to do so. Governments in these…

    • 1635 Words
    • 7 Pages
    Decent Essays